Fake or Compromised? Making Sense of Malicious Clients in Federated Learning Authors: Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr | Published: 2024-03-10 Backdoor AttackPoisoningMalicious Client 2024.03.10 2025.05.27 Literature Database
On Protecting the Data Privacy of Large Language Models (LLMs): A Survey Authors: Biwei Yan, Kun Li, Minghui Xu, Yueyan Dong, Yue Zhang, Zhaochun Ren, Xiuzhen Cheng | Published: 2024-03-08 | Updated: 2024-03-14 Backdoor AttackPrivacy Protection MethodPrompt Injection 2024.03.08 2025.05.27 Literature Database
Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees Authors: Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei | Published: 2024-03-05 Backdoor AttackPoisoningDefense Method 2024.03.05 2025.05.27 Literature Database
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks Authors: Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti | Published: 2024-03-05 Backdoor AttackPoisoningFederated Learning 2024.03.05 2025.05.27 Literature Database
Teach LLMs to Phish: Stealing Private Information from Language Models Authors: Ashwinee Panda, Christopher A. Choquette-Choo, Zhengming Zhang, Yaoqing Yang, Prateek Mittal | Published: 2024-03-01 Backdoor AttackPhishing DetectionPrompt Injection 2024.03.01 2025.05.27 Literature Database
Learning to Poison Large Language Models for Downstream Manipulation Authors: Xiangyu Zhou, Yao Qiang, Saleh Zare Zade, Mohammad Amin Roshani, Prashant Khanduri, Douglas Zytko, Dongxiao Zhu | Published: 2024-02-21 | Updated: 2025-05-29 LLM SecurityBackdoor AttackPoisoning Attack 2024.02.21 2025.05.31 Literature Database
Indiscriminate Data Poisoning Attacks on Pre-trained Feature Extractors Authors: Yiwei Lu, Matthew Y. R. Yang, Gautam Kamath, Yaoliang Yu | Published: 2024-02-20 Backdoor AttackPoisoningTransfer Learning 2024.02.20 2025.05.27 Literature Database
Test-Time Backdoor Attacks on Multimodal Large Language Models Authors: Dong Lu, Tianyu Pang, Chao Du, Qian Liu, Xianjun Yang, Min Lin | Published: 2024-02-13 Backdoor AttackModel Performance EvaluationAttack Method 2024.02.13 2025.05.27 Literature Database
Game-Theoretic Unlearnable Example Generator Authors: Shuang Liu, Yihan Wang, Xiao-Shan Gao | Published: 2024-01-31 WatermarkingBackdoor AttackPoisoning 2024.01.31 2025.05.27 Literature Database
Decentralized Federated Learning: A Survey on Security and Privacy Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif, Boyu Wang, Qiang Yang | Published: 2024-01-25 Attack Methods against DFLBackdoor AttackPrivacy Protection Method 2024.01.25 2025.05.27 Literature Database